[CVE-2008-1467] remote command execution via crafted URL
Bug #212088 reported by
William Grant
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
centericq (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Won't Fix
|
Undecided
|
Unassigned | ||
Edgy |
Won't Fix
|
Undecided
|
Unassigned | ||
Feisty |
Won't Fix
|
Undecided
|
Unassigned | ||
Gutsy |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
centerim (Debian) |
Fix Released
|
Unknown
|
|||
centerim (Ubuntu) |
Fix Released
|
Undecided
|
William Grant | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Edgy |
Invalid
|
Undecided
|
Unassigned | ||
Feisty |
Invalid
|
Undecided
|
Unassigned | ||
Gutsy |
Won't Fix
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
William Grant |
Bug Description
Binary package hint: centerim
"** DISPUTED ** CenterIM 4.22.3 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URI, related to "received URLs in the message window." NOTE: this issue has been disputed due to the user-assisted nature, since the URL must be selected and launched by the victim."
It's still not good, even though it's user-assisted.
Related branches
CVE References
Changed in centerim: | |
assignee: | nobody → fujitsu |
status: | New → In Progress |
status: | New → Invalid |
status: | New → Invalid |
status: | New → Invalid |
Changed in centericq: | |
status: | New → Invalid |
status: | New → Invalid |
Changed in centerim: | |
status: | Unknown → Fix Released |
To post a comment you must log in.
Patch at http:// repo.or. cz/w/centerim. git?a=blobdiff_ plain;f= src/icqconf. cc;fp=src/ icqconf. cc;hb=b28c6deae f58eb685a2d747b 28b6a572122730d 4;hpb=ad6ad53eb f791f97cb7337dc 79ab2ce8ccb1246 f.